diff options
-rw-r--r-- | tempest_lib/services/compute/security_group_rules_client.py | 48 | ||||
-rw-r--r-- | tempest_lib/tests/services/compute/test_security_group_rules_client.py | 66 |
2 files changed, 114 insertions, 0 deletions
diff --git a/tempest_lib/services/compute/security_group_rules_client.py b/tempest_lib/services/compute/security_group_rules_client.py new file mode 100644 index 0000000..e500a06 --- /dev/null +++ b/tempest_lib/services/compute/security_group_rules_client.py @@ -0,0 +1,48 @@ +# Copyright 2012 OpenStack Foundation +# All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); you may +# not use this file except in compliance with the License. You may obtain +# a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT +# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the +# License for the specific language governing permissions and limitations +# under the License. + +from oslo_serialization import jsonutils as json + +from tempest_lib.api_schema.response.compute.v2_1 import \ + security_groups as schema +from tempest_lib.common import rest_client + + +class SecurityGroupRulesClient(rest_client.RestClient): + + def create_security_group_rule(self, **kwargs): + """Creating a new security group rules. + + parent_group_id :ID of Security group. + ip_protocol : ip_proto (icmp, tcp, udp). + from_port: Port at start of range. + to_port : Port at end of range. + Following optional keyword arguments are accepted: + cidr : CIDR for address range. + group_id : ID of the Source group. + """ + post_body = json.dumps({'security_group_rule': kwargs}) + url = 'os-security-group-rules' + resp, body = self.post(url, post_body) + body = json.loads(body) + self.validate_response(schema.create_security_group_rule, resp, body) + return rest_client.ResponseBody(resp, body) + + def delete_security_group_rule(self, group_rule_id): + """Deletes the provided Security Group rule.""" + resp, body = self.delete('os-security-group-rules/%s' % + group_rule_id) + self.validate_response(schema.delete_security_group_rule, resp, body) + return rest_client.ResponseBody(resp, body) diff --git a/tempest_lib/tests/services/compute/test_security_group_rules_client.py b/tempest_lib/tests/services/compute/test_security_group_rules_client.py new file mode 100644 index 0000000..2ff3229 --- /dev/null +++ b/tempest_lib/tests/services/compute/test_security_group_rules_client.py @@ -0,0 +1,66 @@ +# Copyright 2015 NEC Corporation. All rights reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); you may +# not use this file except in compliance with the License. You may obtain +# a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT +# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the +# License for the specific language governing permissions and limitations +# under the License. + +from tempest_lib.services.compute import security_group_rules_client +from tempest_lib.tests import fake_auth_provider +from tempest_lib.tests.services.compute import base + + +class TestSecurityGroupRulesClient(base.BaseComputeServiceTest): + + FAKE_SECURITY_GROUP_RULE = { + "security_group_rule": { + "id": "2d021cf1-ce4b-4292-994f-7a785d62a144", + "ip_range": { + "cidr": "0.0.0.0/0" + }, + "parent_group_id": "48700ff3-30b8-4e63-845f-a79c9633e9fb", + "to_port": 443, + "ip_protocol": "tcp", + "group": {}, + "from_port": 443 + } + } + + def setUp(self): + super(TestSecurityGroupRulesClient, self).setUp() + fake_auth = fake_auth_provider.FakeAuthProvider() + self.client = security_group_rules_client.SecurityGroupRulesClient( + fake_auth, 'compute', 'regionOne') + + def _test_create_security_group_rule(self, bytes_body=False): + req_body = { + "from_port": "443", + "ip_protocol": "tcp", + "to_port": "443", + "cidr": "0.0.0.0/0", + "parent_group_id": "48700ff3-30b8-4e63-845f-a79c9633e9fb" + } + self.check_service_client_function( + self.client.create_security_group_rule, + 'tempest_lib.common.rest_client.RestClient.post', + self.FAKE_SECURITY_GROUP_RULE, + to_utf=bytes_body, **req_body) + + def test_create_security_group_rule_with_str_body(self): + self._test_create_security_group_rule() + + def test_create_security_group_rule_with_bytes_body(self): + self._test_create_security_group_rule(bytes_body=True) + + def test_delete_security_group_rule(self): + self.check_service_client_function( + self.client.delete_security_group_rule, + 'tempest_lib.common.rest_client.RestClient.delete', + {}, status=202, group_rule_id='group-id') |